Viruses and the Innate Immune System -- How Viruses Elicit Interferon Production -- Genes Modulated by Interferons and Double-Stranded RNA -- Immunoevasive Strategies: Host and Virus -- Interferon Antagonists of Influenza Viruses -- The Anti-Interferon Mechanisms of Paramyxoviruses -- The Strategy of Conquest -- Immunomodulation by Poxviruses -- Interferon Antagonists Encoded by Emerging RNA Vi…
Preface -- Chapter 1: Towards a critical understanding to the best practices of ICT in K-12 education in global context -- Chapter 2: How teachers and students depict interactive whiteboards and tablet PCs in a 9th grade classroom? -- Chapter3: A qualitative case study of tablet use in a high school in turkey -- Chapter 4: Teaching and learning effectiveness enhancement project “TLEEP” -- C…
Introduction -- Chapter 1: School-University Partnership for Teacher Education -- Chapter 2: Genealogy of Collaboration -- Chapter 3: Examining the Discourse of Collaboration: a critical take -- Chapter 4: Negotiating Beliefs and Practices in School-University Partnerships -- Chapter 5: Negotiating Identities in School-University Partnerships -- Chapter 6: Negotiating Power and Interpersonal Re…
Chapter 1 Introduction -- Chapter 2 Arab Republic of Egypt -- Chapter 3 State of Palestine -- Chapter 4 Republic of Tunisia -- Chapter 5 Islamic Republic of Iran -- Chapter 6 State of Libya -- Chapter 7 Kingdom of Saudi Arabia -- Chapter 8 Reflections and the Way Forward.This book explores the prospects for higher education development in the Middle East and North African (MENA) region. Adoptin…
A Study of Non-smooth Convex Flow Decomposition -- Denoising Tensors via Lie Group Flows -- Nonlinear Inverse Scale Space Methods for Image Restoration -- Towards PDE-Based Image Compression -- Color Image Deblurring with Impulsive Noise -- Using an Oriented PDE to Repair Image Textures -- Image Cartoon-Texture Decomposition and Feature Selection Using the Total Variation Regularized L 1 Functi…
Authorization and Trust Enhanced Security for Distributed Applications -- Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies -- Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior -- Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry --…
Web Content Delivery -- Web Workload Characterization: Ten Years Later -- Replica Placement and Request Routing -- The Time-to-Live Based Consistency Mechanism: -- Content Location in Peer-to-Peer Systems: Exploiting Locality -- Dynamic Web Content -- Techniques for Efficiently Serving and Caching Dynamic Web Content -- Utility Computing for Internet Applications -- Proxy Caching for Database-B…
Neuroscience -- Spatiotemporal Dynamics of Visual Perception Across Neural Maps and Pathways -- Symmetry, Features, and Information -- Neural Networks -- Geometric Approach to Multilayer Perceptrons -- A Lattice Algebraic Approach to Neural Computation -- Eigenproblems in Pattern Recognition -- Image Processing -- Geometric Framework for Image Processing -- Geometric Filters, Diffusion Flows, a…
Learning and Fuzzy Systems -- Evolutionary Computation -- Intelligent Agents and Systems -- Intelligent Information Retrieval -- Support Vector Machine -- Swarm Intelligence -- Data Mining -- Pattern Recognition -- Applications.
Acute Leukemia -- Hodgkin Lymphoma and Non-Hodgkin Lymphoma -- Brain Tumors: Diagnosis, Surgery and Radiotherapy, and Supportive Care -- Brain Tumors: Chemotherapy and Investigational Therapy -- Wilms’ Tumor -- Neuroblastoma -- Soft-Tissue Tumors -- Osteosarcoma -- Ewing’s Sarcoma -- Retinoblastoma -- Differentiated Thyroid Cancer -- Medullary Thyroid Carcinoma -- Melanoma -- Novel Therapeu…